Abstract
Cryptographic devices are vulnerable to the nowadays well known side channel leakage analysis. Secret data can be revealed by power analysis attacks such as Simple Power Analysis (SPA), Differential Power Analysis (DPA) and Correlation Power Analysis (CPA). First, we give an overview of DPA in mono-bit and multi-bit cases. Next, the existing multi-bit DPA methods are generalized into the proposed Partitioning Power Analysis (PPA) method. Finally, we focus on the CPA technique, showing that this attack is a case of PPA with special coefficients and a normalization factor. We also propose a method that allows us to improve the performance of CPA by restricting the normalization factor.
Chapter PDF
Similar content being viewed by others
References
Akkar, M.L., Giraud, C.: An Implementation of DES and AES Secure Against Some Attacks. In: Koç, Ç.K., Naccache, D., Paar, C. (eds.) CHES 2001. LNCS, vol. 2162, pp. 309–318. Springer, Heidelberg (2001)
Akkar, M.L., Goubin, L.: A Generic Protection Against High-Order Differential Power Analysis. In: Johansson, T. (ed.) FSE 2003. LNCS, vol. 2887, pp. 192–205. Springer, Heidelberg (2003)
Akkar, M.L., Bevan, R., Dischamp, P., Moyart, D.: Power Analysis, What Is Now Possible.... In: Okamoto, T. (ed.) ASIACRYPT 2000. LNCS, vol. 1976, pp. 489–502. Springer, Heidelberg (2000)
Bevan, R., Knudsen, E.: Ways to Enhance DPA. In: Lee, P.J., Lim, C.H. (eds.) ICISC 2002. LNCS, vol. 2587, pp. 327–342. Springer, Heidelberg (2003)
Brier, E., Clavier, C., Olivier, F.: Correlation Power Analysis with a Leakage Model. In: Joye, M., Quisquater, J.-J. (eds.) CHES 2004. LNCS, vol. 3156, pp. 16–29. Springer, Heidelberg (2004)
Chari, S., Jutla, C.S., Rao, J.R., Rohatgi, P.: Towards Sound Approaches to Counteract Power Analysis Attacks. In: Wiener, M. (ed.) CRYPTO 1999. LNCS, vol. 1666, pp. 398–412. Springer, Heidelberg (1999)
Coron, J.S., Goubin, L.: On Boolean and Arithmetic Masking Against Differential Power Analysis. In: Paar, C., Koç, Ç.K. (eds.) CHES 2000. LNCS, vol. 1965, pp. 231–237. Springer, Heidelberg (2000)
Coron, J.S., Kocher, P., Naccache, D.: Statistics and Secret Leakage. In: Frankel, Y. (ed.) FC 2000. LNCS, vol. 1962, pp. 157–173. Springer, Heidelberg (2001)
Goubin, L., Patarin, J.: DES and Differential Power Analysis: The Duplication Method. In: Koç, Ç.K., Paar, C. (eds.) CHES 1999. LNCS, vol. 1717, pp. 158–172. Springer, Heidelberg (1999)
Kocher, P., Jaffe, J., Jun, B.: Introduction to Differential Power Analysis and related attacks, http://www.cryptography.com
Kocher, P., Jaffe, J., Jun, B.: Differential Power Analysis. In: Wiener, M. (ed.) CRYPTO 1999. LNCS, vol. 1666, pp. 388–397. Springer, Heidelberg (1999)
Mayer-Sommer, R.: Smartly Analysing the Simplicity and the Power of Simple Power Analysis on Smartcards. In: Paar, C., Koç, Ç.K. (eds.) CHES 2000. LNCS, vol. 1965, pp. 78–92. Springer, Heidelberg (2000)
Messerges, T.S., Dabbish, E.A., Sloan, R.H.: Investigations of Power Analysis Attacks on Smartcards. In: proceedings of the USENIX Workshop on Smart Card Technology (1999), http://www.usenix.org/
Messerges, T.S., Dabbish, E.A., Sloan, R.H.: Examining Smart-Card Security under the Threat of Power Analysis Attacks. IEEE Transactions on Computers 51(5), 541–552 (2002)
Canovas, C., Clédière, J.: What do S-boxes Say in Differential Side Channel Attacks? Cryptology ePrint Archive, Report 20085/311 (2005), http://eprint.iacr.org/
Guilley, S., Hoogvorst, P., Pacalet, R.: Differential Power Analysis Model and some Results. In: proceedings of CARDIS 2004, pp. 127–142. Kluwer Academic Publishers, Dordrecht (2004)
Gandolfi, K., Mourtel, C., Olivier, F.: Electromagnetic Attacks: Concrete Results. In: Koç, Ç.K., Naccache, D., Paar, C. (eds.) CHES 2001. LNCS, vol. 2162, pp. 251–261. Springer, Heidelberg (2001)
Harpes, C.: Partitioning Cryptanalysis. Post-Diploma Thesis, Signal and Information Processing Lab., Swiss Federal Institute of Technology, Zurich (March 1995), http://www.isi.ee.ethz.ch/~harpes/pc.ps
Jakobsen, T.: Correlation Attacks on Block Ciphers, Master’s Thesis, Dept. of Mathematics, Technical University of Denmark (January 1996)
Quisquater, J.J., Samyde, D.: Electromagnetic Analysis (EMA): Measures and Countermeasures for Smart Cards. In: Attali, S., Jensen, T. (eds.) E-smart 2001. LNCS, vol. 2140, pp. 200–201. Springer, Heidelberg (2001)
Rao, J.R., Rohatgi, P.: EMpowering Side-Channel Attacks. Cryptology ePrint Archive, Report 2001/037 (2001), http://eprint.iacr.org/
Bevan, R.: Estimation statistique et sécurité des cartes à puces, évaluation d’attaques DPA évolués. OCS, rapport de thèse (2004)
Press, W.H., Teukolsky, S.A., Vetterling, W.T., Flannery, B.P.: Numerical Recipes in C++, 2nd edn., p. 1002. Cambridge University Press, New York (2002)
Rao, J.R., Rohatgi, P., Scherzer, H., Tinguely, S.: Partitioning Attacks: Or How to Rapidly Clone Some GSM Cards. In: proceedings of the 2002 IEEE Symposium on Security and Privacy, pp. 31–41. IEEE Computer Society, Los Alamitos (2002)
Standaert, F.-X., Mace, F., Peeters, E., Quisquater, J.-J.: Updates on the Security of FPGAs Against Power Analysis Attacks. In: Bertels, K., Cardoso, J.M.P., Vassiliadis, S. (eds.) ARC 2006. LNCS, vol. 3985, pp. 335–346. Springer, Heidelberg (2006)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2006 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Le, TH., Clédière, J., Canovas, C., Robisson, B., Servière, C., Lacoume, JL. (2006). A Proposition for Correlation Power Analysis Enhancement. In: Goubin, L., Matsui, M. (eds) Cryptographic Hardware and Embedded Systems - CHES 2006. CHES 2006. Lecture Notes in Computer Science, vol 4249. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11894063_14
Download citation
DOI: https://doi.org/10.1007/11894063_14
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-46559-1
Online ISBN: 978-3-540-46561-4
eBook Packages: Computer ScienceComputer Science (R0)